Securing cloud data system (SCDS) for key exposure using AES algorithm
Nowadays the internet communication playing the imperative role that used to transfer large amount of cloud data in various fields and website applications. In the internet the cloud date and files for the websites transmitted through insecure channel from the sender to the receiver. In the transfer...
| Main Author: | Thabet Albatol, Mohammed Samer Hasan |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/6993/ http://eprints.uthm.edu.my/6993/1/24p%20MOHAMMED%20SAMER%20HASAN%20THABET%20ALBATOL.pdf http://eprints.uthm.edu.my/6993/3/MOHAMMED%20SAMER%20HASAN%20THABET%20ALBATOL%20WATERMARK.pdf http://eprints.uthm.edu.my/6993/4/MOHAMMED%20SAMER%20HASAN%20THABET%20ALBATOL%20COPYRIGHT%20DECLARATION.pdf |
Similar Items
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Enhanced AES algorithm based on 14 rounds in securing data
and minimizing processing time
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Cloud-to-cloud data transfer parallelization framework via spawning intermediate instances for scalable data migration
by: Boey, Calvin Mun Lek
Published: (2019)
by: Boey, Calvin Mun Lek
Published: (2019)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Managing big RDF data in clouds: challenges, opportunities, and solutions
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Secure mobile AES encryptor (SMAE)
by: Satia, Anbalagan
Published: (2016)
by: Satia, Anbalagan
Published: (2016)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016)
by: Mohanaad, Shakir, et al.
Published: (2016)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
A proposal for improving AES S-box with rotation and key-dependent
by: Juremi, Julia, et al.
Published: (2012)
by: Juremi, Julia, et al.
Published: (2012)
Security and accountability for sharing the data stored in the cloud‏
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
Determinants of Mobile Phone to Adopt Personal Cloud Online Data Service in Malaysia
by: Koon, Meng Kit
Published: (2017)
by: Koon, Meng Kit
Published: (2017)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Face Recognition For Home Security System Using Hybrid Fisher Linear Discriminant Algorithm
by: Zhi, Chua Min Zhi
Published: (2009)
by: Zhi, Chua Min Zhi
Published: (2009)
Similar Items
-
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023) -
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014) -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016) -
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)